Keeping Bad Guys Out of Your Digital Life
Access denied. How do you go about keeping bad guys out of your digital life? Again, let's think about how we do this in the real world. When you go ahead and have a big house, you lock all of the doors when you go to work in the morning. But if you lock all of the doors and leave the window open, guess where the burglars are gonna come in? They're gonna take the easiest route to break into your lives, so you need to lock access down. You need to deny access to people who wanna get into your digital life that don't belong there. And you can do this for multiple different devices. So let's start talking about computers and laptops. You definitely should be setting an access password for your computer, which means when you boot it up, you have to turn on a password. On the Mac computers, you do this in the firmware and there are instructions online and in some of our resources that will walk you through this. And for each one of your accounts, you can have a password. So you should defin...
itely go ahead and require a password. Right, and disable automatic login. If you've got automatic login and no password on your home computer, your kids, you know, their friends, after school, the burglar, anybody can get into all of your accounts and see all of your information. So definitely set an account password for your digital accounts. You can certainly do the same things in Windows. Go to Start, Settings, Accounts, and Sign-in Options. And there, you can set the password. And this is, again, all explained in the literature that we'll be sharing with you. Mobile phones. Guess what, these need passwords too. You definitely want to set a passcode. Why do you want to set a passcode on your phone? Because it's got a ton of your data too. And here's a startling statistic from Consumer Reports. Five million people. I'm sorry. Before we get into that one, let's talk about this. 64% of people don't set a password on their phones. How many of you don't have a password on your phone? You're not gonna admit it. If you don't have a password on your phone, get out. Right, get out of the class right now. We'll talk more about smartphone security in the upcoming lesson. But more than half the people don't even have access to their cellphone locked down with a password. Don't be one of those people. On the iPhone, nowadays, go into Settings, Touch ID and Password, set the Passcode Options. It used to be the standard was four digits-long. Apple has recognized that risk and has now raised it to six digits-long. The choice that I like better is the custom alphanumeric code, where you can put in 20 digits or something much longer, which will protect you better. There's also a very cool trick that you can try called biometrics, right. Nowadays, more and more phones can be unlocked with not something you know, like a password, but something you are, like facial recognition or a fingerprint or iris scan. That's a biometric. And Apple has implemented Touch ID. Some of you might be, who's freaked out about, like, putting their fingerprint on their phone, right? That's a little scary. But I've studied what they're doing and how they've implemented it and I'm liking what I see. That password, meaning your fingerprint, your biometric fingerprint, is not stored in software. It is only stored in a special encrypted, isolated chip on the phone and it never leaves your phone. Okay, so I think they've done a good job implementing it there. On Androids, the implementations vary widely. They're many examples out there of Android biometrics that have been subverted by going ahead and taking a piece of cellophane tape. So if you leave your fingerprint on the window to your car, I can walk up with a piece of cellophane tape, put it on your phone, and it will unlock. So study your Android biometrics very carefully. The new form of biometrics that we're starting to see, I think, Samsung has this and the iPhone 10 has this, is facial recognition. In my personal view, this is less mature. I like it less, there's some advertising concerns that I definitely have about this. So it's a work in progress. I personally don't use facial recognition on my phones. I'm more comfortable with fingerprints, due to the technology behind it. Again, if you're in Android and you wanna turn on fingerprint, go to Settings, Tap Passcode, and make sure that you turn on the passcode, and that's where you can see the Fingerprint Unlock there. Another thing that you should do. So we've talked about, you know, boot passwords for your computer. We've talked about account passwords for your computer. We've talked about passwords for your mobile phones. You should also turn on a firewall to block access to your computer. Firewall is an excellent to control access to your entire digital life. And if you have any firewalls available, turn them on. Most computers have some type of firewall system. What is a firewall? Where does the term come from? Well, back in the day, when there were actual, real fires, a firewall was a larger, thicker, specially enforced wall, whose job it was to keep out the fire and prevent things from burning down. So it's a highly reinforced fire-proof way of preventing fires from spreading. And that's the concept behind the modern computer firewall. Think of it as a castle in a moat. It's building all of these protections around you and your digital life. Or another actually pretty accurate way of thinking about what a firewall does is, it's kinda like Wonder Woman. You know, like, when the bad guys shoot at her all the time and she lifts up her magical bracelets and go, ping, ping, ping, and all the bullets fly away? That's what a firewall does. Everyday, every second, if your computer is online, it is being pinged, meaning attacked or checked by other computers all over the world. What a firewall does is, it blocks your computer and your data with those magical bracelets. So turn it on. Macs have it built in right under Security and Privacy. Just go to Firewall and click Turn On and that's all you need to do. There's an additional feature, where you can also block incoming connections. Unless you're running a network or something funky, you should not need extra connections, so turn this off. If some device that you have in your home stops working, then you may need to turn this back on. But I strongly recommend not having it on. In Windows, go under Control Panel system settings and you'll see Windows Firewall. Now, those two firewalls that we just discussed are what are called software firewalls. Software, because they're already built into the software operating system of your Windows or Mac machine. But it turns out that there's a second type of firewall, which is also highly, highly effective and I recommend both. And that's a hardware firewall. And as I mentioned, what they do is protect your computer. This is the firewall, that's the big, mean Internet world. They block all of the incoming requests for your data. If you have a home wifi router, there's a decent chance that it will have a built-in firewall that you can just turn on. Now, I'm not gonna lie to you. Dealing with your cable company's router is a pain in the butt. It's entirely non-intuitive and it's usually not updated and it's really old technology. So turn it on if you can, make sure it's up-to-date. But there's actually a much better solution, one that I really, really like and it's hell of a lot easier. And that is this thing called Cujo AI. It's a next-generation smart firewall and I'm gonna talk a lot more about this in the Protect Your Home section of the class. But for right now, just know that the coolest feature of Cujo is, you can go ahead and control it with an app on your phone. It's easier to understand than the standard firewalls and you can do a lot with it. It'll block you against cyber-attacks, DDoS attacks, and malware. And it's wicked cute. So we'll talk about Cujo later. Another thing to keep in mind from an access perspective, something that you want to deny people to, is access to your USB port, right. USBs can be really, really dangerous. And a high, high percentage of them carry malware, right. And they can do amazing things. It's not just that sharing thumb drives can give your computer a virus. But now, the attacks are becoming more harmful and pernicious. And just by plugging in a stranger's hard drive, you can actually, sorry, thumb drive, you can actually fry the motherboard of your computer, like an egg. So if you want to avoid that, don't put a stranger's thumb drive in your computer. And to help you understand, like, the risk here, it was over a decade ago that the U.S. military banned thumb drives. You can no longer use thumb drives on any DOD computer. They've actually taken away the thumb drive port, the USB port, so that's for protection. Now, how many of you have seen things like this in airports? Right, it's like, oh my god, I've got 4% left on my phone and I need to charge it, so I can download, you know, the latest version of Harry Potter or Stranger Things or whatever it is out there you wanna watch. They look so nice. But look at the construction of this device. What is going behind, what's going on behind this cardboard? What's going on behind this metal? What are the wires doing? What do they connect to? What do they connect to here? What's inside that box? You don't know. And now, knowing that you can go ahead and plug in your USB device for charging and it will fry your computer or fry your phone, you should view all of these with suspicion. And it turns out that criminals, being inventive as they are, have broken into these devices in high traffic areas around the world. So they open up the thing that looks like the big charging station and they've put their own malware on the computer. And the minute that you plug in your phone, right, because remember, you've got a data cable that syncs and doesn't just charge your phone, it syncs the data. That is now gonna put malware on your phone or on your computer, so beware of that. And it's not just on iPhones, it's also happened with Androids, where you can go ahead and get infected just by plugging into a strange USB port. I want to take a moment to give you a lesson from the world of public health, right. Because I think we can take a public health lesson and perspective when think about the threats from our USB devices. When we talk about cyber-threats, you know, cyber-security experts tend to always talk about computer infections and computer viruses. And what you can hear in that is that we use the language of medicine to describe the problem, but we don't use the tools of medicine to fix the problem. Right, what public health tools can be bring to bear on particular cyber-security threats? And as I was thinking long and hard, this is one that I came up with. I know it looks a little weird, but there is an analogy that you can use with regards to your USB devices, right. When it comes to your own personal body, you do not stick your parts in lots of different places without bad results. And you don't let other people stick their parts in you without really, really bad results. You take common precautions. You take a public health approach to your own physical life and you need to do the same thing with your digital life. And it turns out, there's kind of a USB condom out there that I am going to recommend to you. And this is what it looks like. It's made by a company called PortaPow. You'll notice that I use this on all of my devices. So what this does is, it blocks any data from transferring between my device on the other end of it and this USB blocker. It allows power to come through, but it blocks data. And you will wanna use these as much as you can. They're only a couple of bucks. What is it, eight bucks. And I think you get two of them, right. So go ahead and get these. You can find them on Amazon and elsewhere. You can feel secure about plugging in your devices. And some places that you might not think to use this, you really should. For example, airplanes. There's malware on airplanes. Don't just plug in your phone to the airplane charger. And particularly, rental cars. You don't know how many times I've gone to Rent-a-Car and I see six other people's phone books and addresses and all that stuff that they've left on the car system, that's still on the Ford system or the Honda system or whatever. Using something like this will allow you to benefit from the charger, but will go ahead and block any of those threats. So highly recommended and it complete eliminates a vector of infection for you.
Are you ready for a proven, insanely simple plan to lock down your digital life, defend yourself against hackers and reduce your cyber risk by up to 85%? How to Secure Your Digital Life is a one-day program that has helped tens of thousands of people and can help you finally achieve peace of mind for all your online activities and digital life. With cyber attacks at an all-time high—and rising every day—you owe it to yourself and your family to learn the critical art of cyber self-defense. If you don’t protect yourself, who will?
Did you know...
• Everyday malicious hackers around the world release nearly 1 million new malware threats.
• Antivirus software only catches 5% of new threats targeting your computer.
• Identity theft strikes a new victim every two seconds in the United States, and children are more than 50 times more likely to suffer identity theft than adults.
• The average American has over 130 online accounts today; a number predicted to rise to over 200 by 2020.
• Ransomware attacks were up 250% in 2017 and are expected to cause nearly 12 billion dollars in damage by 2019.
• Nearly 600,000 Facebook accounts are hacked on a daily basis.
• According to IBM Security, 95% of data breaches can be traced back to human error.
Technology companies, app makers, and social media firms are vacuuming up every scrap of private data they can, including your location, personal photos, dating habits and entire browsing history. They can even remotely activate your phone’s camera or microphone—all without your knowledge. All of this personal data can be used against you, to determine whether you are offered that next job, promotion, car loan, or mortgage.
Today’s hackers, organized criminals, fraudsters, online predators and cyber bullies are threatening you, your family and your money on a daily basis. Don’t be an easy target, learn how to fight back. You may have heard privacy is dead and there is nothing you can do to protect yourself. This is not true. Companies and criminals alike want you to think that—don’t fall for it.
Small steps can make a huge difference in your personal and professional cybersecurity, and we’ll show you all the insider tips and secrets you need. There’s no such thing as perfect security, but after this class, you can be vastly more protected and secure than you are today and Marc Goodman, the cyber security expert, who has helped tens of thousands of people protect themselves and take charge of their digital lives, is the guy to teach it to you.
Marc is the author of Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It. Future Crimes is a New York Times and Wall Street Journal bestseller and was Amazon’s Best Business Book of the Year. Marc has an extensive background in global security and law enforcement, including work as a street police officer, undercover investigator and senior advisor to INTERPOL and the US Government. His pioneering work on cybercrime investigation has been featured on CNN, NPR, Larry King, PBS, the Tim Ferriss Podcast, and TED.
In this pioneering course on How to Secure Your Digital Life, Marc shares with you the secrets to protecting yourself online and how to use the very best of the technological tools we depend on for our modern lives. You’ll learn the basics of cyber self-defense and quick, specific actionable steps to improve your privacy, security, and safety in the online world.
In this class you will learn:
• How to reduce your cyber risk by up to 85% or more.
• The #1 online security habit that changes everything
• Why experts who tell you privacy is dead are dead-wrong
• How to finally master and organize all your passwords in a simple easy to manage system
• Why you need to avoid using dangerous “administrator accounts” and how you are using them without even knowing about it
• How to use a Virtual Private Network to secure your connections when traveling, at the local coffee shop or home
• How to protect yourself and your children from identity thieves and scammers eager to take your hard-earned money
• About the rarely used, totally free tool that can make it nearly impossible to hack your online accounts
• How to protect yourself from the exponentially growing ransomware threat and how to prevent hackers from destroying all of your emails, photos, videos, and sensitive documents
• How to lock down your mobile phones against hackers, theft, and spyware
Whether you are a complete cybersecurity beginner or an experienced user, his class is made for anybody who uses the Internet, a computer or mobile phone and will cover Windows, Mac, iPhones, and Android devices. What you don’t know about Internet safety and security can harm you, your family and cost you your life savings. Don’t miss this opportunity to learn from a global cybercrime expert how to protect yourself and your digital future. This comprehensive, easy to understand, fun and the engaging course will crush your cybersecurity doubts. Defend yourself once and for all. Now’s the perfect time to take the next step to a safer, more secure digital future.